Getting ready for DEF CON 27

1. August 2019

We are excited to present one of our in-house developments at DEF CON 27 – the CST Chef. Our Heroes and developers Sebastian Puttkammer and Ralf Almon, Managing Consultants at usd HeroLab, have taken a brief moment to say some quick words.

Ralf, DEF CON is a staple conference of the international hacker scene. How did you react when you learned that your CST Chef had been accepted?

Ralf Almon: I was extremely excited that the Chef had been accepted, of course. Sebastian and I have put in a lot of time and work. But I’m also humble at the thought of being able to present our work to an international audience.

Sebastian, what’s the first thing that comes to your mind when you think about your presentation?

Sebastian Puttkammer: (laughs) I pray to the “demo gods” that nothing will go wrong on our big day.

You’re off to Las Vegas on Sunday. What are your last minute preparations?

RA: We are in the final stages of refining the recipe even further. We hope the audience will like the taste.

SP: By the way, to all of you out there: We can always use more chefs at usd HeroLab.

Also interesting:

3 Reasons for a Cloud Security Audit

3 Reasons for a Cloud Security Audit

Outsourcing applications and data to the cloud brings significant benefits for companies, but at the same time also new challenges for the corresponding IT departments. The technologies and processes of a cloud environment differ from those of local data centers....

usd HeroLab Top 5 Vulnerabilities 2020: SMB 1.0 & SMB Signing

usd HeroLab Top 5 Vulnerabilities 2020: SMB 1.0 & SMB Signing

During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate security. They increasingly identify the same vulnerabilities in different IT assets, some of which have been known for...

Security Advisory 08/2021

Security Advisory 08/2021

The usd HeroLabs pentesters have identified a vulnerability in the products of the manufacturer TIBCO while conducting their security analyses. Specifically, this is a vulnerability in the “Weak Password Requirements” category that has been classified as critical. The...

Categories

Categories